Feeds

EA games web server was hosting PHISHING SITE – securobod

Old vulnerable software gave hackers a way in, claims researcher

The Essential Guide to IT Transformation

An Electronic Arts server was hacked and used to host a phishing site targeting Apple ID holders, according to internet security firm Netcraft.

The site has since been pulled down and EA has told various news sites that it is "investigating" the report.

Netcraft security expert Paul Mutton posted on the company's blog that the server was used by two websites in the ea.com domain, and usually hosted a calendar based on an old piece of software that contained several security vulnerabilities which have since been sorted out - WebCalendar 1.2.0.

"It is likely that one of these vulnerabilities was used to compromise the server, as the phishing content is located in the same directory as the WebCalendar application," he said.

Mutton said the phishing site attempted to get victims to sign in with their Apple ID and password and then verify their name, card number, expiry date, verification code, date of birth, phone number, mother's maiden name and basically every piece of info necessary to completely steal a person's identity.

If the poor victim got that far, they were then redirected to the legitimate Apple ID site, potentially none the wiser, he claimed.

Mutton said that companies who left old pieces of software hanging around on their servers were asking for trouble.

"The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities," he said.

Dwayne Melancon, CTO of security software firm Tripwire, said that businesses weren't doing enough to ensure that these sorts of vulnerabilities were shut down.

"We regularly see attackers take advantage of neglected, abandoned, or unpatched applications running on company infrastructure. This is interesting in that it is a problem that we know how to solve but enterprises just aren’t taking the necessary precautions," he said.

It's unclear how long the phishing site was active on Electronic Arts' server or how many people might have been tricked into handing over their Apple IDs. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.